CVE-2018-11771
Published: 16 August 2018
When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package.
Priority
Status
Package | Release | Status |
---|---|---|
libcommons-compress-java Launchpad, Ubuntu, Debian |
bionic |
Needed
|
cosmic |
Released
(1.18-1)
|
|
disco |
Released
(1.18-1)
|
|
eoan |
Released
(1.18-1)
|
|
focal |
Released
(1.18-1)
|
|
groovy |
Released
(1.18-1)
|
|
hirsute |
Released
(1.18-1)
|
|
impish |
Released
(1.18-1)
|
|
jammy |
Released
(1.18-1)
|
|
kinetic |
Released
(1.18-1)
|
|
lunar |
Released
(1.18-1)
|
|
mantic |
Released
(1.18-1)
|
|
trusty |
Does not exist
(trusty was needs-triage)
|
|
upstream |
Needs triage
|
|
xenial |
Needed
|
|
Patches: other: https://github.com/apache/commons-compress/commit/a41ce689 other: https://github.com/apache/commons-compress/commit/0fe6ae31 other: https://github.com/apache/commons-compress/commit/64ed6dde |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.5 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
References
- http://www.openwall.com/lists/oss-security/2018/08/16/2
- http://www.securitytracker.com/id/1041503
- https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E
- https://www.cve.org/CVERecord?id=CVE-2018-11771
- NVD
- Launchpad
- Debian